[MAR 2021] CompTIA PK0-004 exam dumps and online practice questions are available from Lead4Pass

The latest updated CompTIA PK0-004 exam dumps and free PK0-004 exam practice questions and answers! Latest updates from Lead4Pass CompTIA PK0-004 Dumps PDF and PK0-004 Dumps VCE, Lead4Pass PK0-004 exam questions updated and answers corrected! Get the full CompTIA PK0-004 dumps from https://www.leads4pass.com/pk0-004.html (VCE&PDF)

Latest PK0-004 PDF for free

Share the CompTIA PK0-004 Dumps PDF for free From Lead4pass PK0-004 Dumps part of the distraction collected on Google Drive shared by Lead4pass
https://drive.google.com/file/d/1XoSaxAUGo1Rh3TyBVa9lKOMb2l8Iteg2/

The latest updated CompTIA PK0-004 Exam Practice Questions and Answers Online Practice Test is free to share from Lead4Pass (Q1-Q13)

QUESTION 1
A project manager is assigned a project that is part of the company\\’s strategic objectives. Of which of the following is
the project a part?
A. Project management office
B. Portfolio
C. Program
D. Mission statement
Correct Answer: B

 

QUESTION 2
A project manager needs status on the project timeline.
Which of the following team members should provide an update?
A. Product owner
B. Business analyst
C. Scheduler
D. Sponsor
Correct Answer: C

 

QUESTION 3
Which of the following are characteristics of a project? (Choose two.)
A. Ongoing
B. Temporary
C. Start and finish
D. Achieving a goal
E. Consisting of milestones
F. Restricting the budget
Correct Answer: BC
Reference: Kim Heldman, CompTIA Project+ Study Guide, 2nd Edition, Sybex, Indianapolis, 2017, p. 27

 

QUESTION 4
A company engaged a third-party audit firm to provide regular financial oversight for regulatory compliance and
requested a project manager to work with the firm. The PMO declines to assign a project manager and refers to another
department within the company. Which of the following is MOST likely the reason for this?
A. There are not enough project managers available for additional work
B. The work does not align with the strategic objectives of the organization
C. This is ongoing work the vendor has been hired to perform
D. The third party has a reputation for expertise in this area
Correct Answer: D

 

QUESTION 5
New requirements were introduced during the execution phase of a project, and the team believes this will impact the
project cost but not the timely completion of project deliverables.
Which of the following is the BEST way for the PM to validate the assessment?
A. Ask the team for estimates, and review the project schedule and budget.
B. Ask the team to review the product scope and validate its impact on the schedule and quality.
C. Ask the team for estimates, and review the cost management plan.
D. Ask the team to perform a SWOT analysis, and validate the assessment.
Correct Answer: D

 

QUESTION 6
A project team has failed to deliver on changes the project manager outlined on a call two weeks ago. The project team
members indicate they did not remember the contents on the call. Which of the following should the project manager do
FIRST to improve the level of awareness of changes to the project schedule?
A. Define the communications plan.
B. Record the missed tasks on the issue log.
C. Provide meeting minutes after each call.
D. Complete a fishbone diagram.
Correct Answer: A

 

QUESTION 7
A stakeholder informs a project manager that a weekly status report has not been delivered via email, but the monthly
status reports were received. Which of the following should the project manager do NEXT?
A. Immediately send the current weekly status report
B. Add email to the distribution list for the weekly status report
C. Remove email from the distribution list for the monthly status report
D. Consult the communications plan and act accordingly
Correct Answer: B

 

QUESTION 8
A project manager is overseeing a multinational project, and team leaders from numerous countries indicate the team
members have low morale.
Which of the following is the MOST likely reason the project manager would be unaware of the team member\\’s
decreased morale?
A. The project manager did not pay attention to visual cues.
B. The project manager did not perform active listening.
C. The project manager did not prioritize team member concerns.
D. The project manager did not visit the project\\’s international office locations.
Correct Answer: D

 

QUESTION 9
A customer asks a project manager if a small change can be made during the delivery phase. The project manager
does not agree to the change.
Which of the following is the MOST likely reason?
A. Established communication plan
B. Scope creep
C. Resource constraints
D. Iterative approach
Correct Answer: B
Reference: Kim Heldman, CompTIA Project+ Study Guide, 2nd Edition, Sybex, Indianapolis, 2017, p. 133

 

QUESTION 10
A project manager is justifying a required change with the associated impact on the project.
Which of the following is the NEXT step?
A. Implementation
B. Approval
C. Validation
D. Auditing
Correct Answer: B
Reference: Kim Heldman, CompTIA Project+ Study Guide, 2nd Edition, Sybex, Indianapolis, 2017, p. 294

 

QUESTION 11
A project can be defined as:
A. permanent and ongoing.
B. temporary and unique.
C. temporary and standard.
D. permanent and unique.
Correct Answer: B

 

QUESTION 12
The PMO is confused by an entry in the risk register and would like the project manager to provide clarification
regarding strategy. Based on the following entry:[2021.3] lead4pass pk0-004 practice test q12

Which of the following should be modified to BEST eliminate confusion?
A. Change the status to issue and include it in the issue log
B. Change the strategy to mitigate
C. Change the name to identify the problem clearly
D. Change the owner to sponsor
Correct Answer: B

 

QUESTION 13
Due to a lack of adherence to the risk response plan, there are numerous safety concerns within the scope of a building
project.
Which of the following MOST likely explains this issue?
A. Risks were not identified.
B. Risks were not mitigated.
C. Risks were not exploited.
D. Risks were not communicated.
Correct Answer: D


Braindump4it shares the latest updated CompTIA PK0-004 exam exercise questions, PK0-004 dumps pdf for free.
All exam questions and answers come from the Lead4pass exam dumps shared part! Lead4pass updates throughout the year and shares a portion of your exam questions for free to help you understand the exam content and enhance your exam experience!
Get the full CompTIA PK0-004 exam dumps questions at https://www.leads4pass.com/pk0-004.html (pdf&vce)

ps.

Get free CompTIA PK0-004 dumps PDF online: https://drive.google.com/file/d/1XoSaxAUGo1Rh3TyBVa9lKOMb2l8Iteg2/

[MAR 2021] CompTIA N10-007 exam dumps and online practice questions are available from Lead4Pass

The latest updated CompTIA N10-007 exam dumps and free N10-007 exam practice questions and answers! Latest updates from Lead4Pass CompTIA N10-007 Dumps PDF and N10-007 Dumps VCE, Lead4Pass N10-007 exam questions updated and answers corrected! Get the full CompTIA N10-007 dumps from https://www.leads4pass.com/n10-007.html (VCE&PDF)

Latest N10-007 PDF for free

Share the CompTIA N10-007 Dumps PDF for free From Lead4pass N10-007 Dumps part of the distraction collected on Google Drive shared by Lead4pass
https://drive.google.com/file/d/1_ouXtulK7z2ADOnWJf6Zu8lBpJp3f1_3/

The latest updated CompTIA N10-007 Exam Practice Questions and Answers Online Practice Test is free to share from Lead4Pass (Q1-Q13)

QUESTION 1
Lisa, a technician, has configured a new switch that is remotely accessed using SSH. The switch is working properly but
cannot be accessed remotely. Which of the following items is MOST likely missing in the configuration?
A. Port speed
B. Cryptokey
C. Data VLAN
D. NAT/PAT
Correct Answer: B

QUESTION 2
A network engineer is configuring wireless access for guests at an organization. Access to other areas in the
organization should not be accessible to guests. Which of the following represents the MOST secure method to
configure guest access to the wireless network?
A. Guests should log into a separate wireless network using a captive portal
B. Guests should log into the current wireless network using credentials obtained upon entering the facility
C. The existing wireless network should be configured to allow guest access
D. An additional wireless network should be configured to allow guest access
Correct Answer: A

QUESTION 3
Which of the following network topologies typically has all devices on a network directly connected to every other
network device?
A. Mesh
B. Star
C. Ad hoc
D. Ring
Correct Answer: A

QUESTION 4
Which of the following BEST describes how a layer 2 switch functions?
A. Switches packets within the same subnet based on MAC addresses
B. Switches packets between different subnets based on IP addresses
C. Switches packets between different subnets based on MAC addresses
D. Switches packets between different subnets based on MAC addresses
Correct Answer: A

QUESTION 5
A network technician is trying to terminate CAT5 modular jacks. Which of the following tools would be MOST
appropriate for this scenario?
A. Crimper
B. OTDR
C. Throughput tester
D. Punch down tool
Correct Answer: D

QUESTION 6
Jeff, an administrator, has just finished installing a new switch and connected two servers with IPs of 192.168.105.20
and .30. The servers are able to communicate with each other, but are unable to reach the Internet. Jeff sees the
following information in the switch configuration: interface VLAN 105 IP address 192.168.105.5 255.255.255.0 Jeff is
able to ping the router at 192.168.105.1 from the switch.
Which of the following is the MOST likely cause of the problem?
A. The subnet mask is incorrect.
B. A routing loop has occurred.
C. Jeff used a crossover cable to connect the switch to the gateway.
D. The server is missing default-gateway information.
Correct Answer: D

QUESTION 7
A supervisor requests that a technician downloads a MIB for a particular server. Which of the following protocols
requires MIBs?
A. IPSec
B. SSL
C. ISAKMP
D. SNMP
Correct Answer: D

QUESTION 8
A second router was installed on a network to be used as a backup for the primary router that works as a gateway. The
infrastructure team does not want to change the IP address of the gateway on the devices. Which of the following
network components should be used in this scenario?
A. Loopback IP
B. Virtual IP
C. Reserved IP
D. Public
Correct Answer: B

QUESTION 9
Management has requested that a wireless solution be installed at a new office. Which of the following is the FIRST
thing the network technician should do?
A. Order equipment
B. Create network diagrams
C. Perform a site survey
D. Create an SSID.
Correct Answer: C

QUESTION 10
Which of the following network topologies allows only communication to take place from one node at a time by passing
a token around the network?
A. Star
B. Mesh
C. Bus
D. Ring
Correct Answer: D

QUESTION 11
Privilege creep among long-term employees can be mitigated by which of the following procedures?
A. User permission reviews
B. Mandatory vacations
C. Separation of duties
D. Job function rotation
Correct Answer: A

QUESTION 12
Which of the following ports would Zach, a technician, need to open on a firewall to allow SSH on the default port?
A. 20
B. 21
C. 22
D. 23
Correct Answer: C

QUESTION 13
A technician needs to connect two routers using copper cables. Which of the following cables would utilize both the
TIA/EIA 568a and TIA/EIA 568b standards?
A. Cat5 crossover
B. Cat5e straight-through
C. Cat5e rollover
D. Cat6 console
E. Cat6a straight-through
Correct Answer: A


Braindump4it shares the latest updated CompTIA N10-007 exam exercise questions, N10-007 dumps pdf for free.
All exam questions and answers come from the Lead4pass exam dumps shared part! Lead4pass updates throughout the year and shares a portion of your exam questions for free to help you understand the exam content and enhance your exam experience!
Get the full CompTIA N10-007 exam dumps questions at https://www.leads4pass.com/n10-007.html (pdf&vce)

ps.

Get free CompTIA N10-007 dumps PDF online: https://drive.google.com/file/d/1_ouXtulK7z2ADOnWJf6Zu8lBpJp3f1_3/

[MAR 2021] CompTIA CV0-002 exam dumps and online practice questions are available from Lead4Pass

The latest updated CompTIA CV0-002 exam dumps and free CV0-002 exam practice questions and answers! Latest updates from Lead4Pass CompTIA CV0-002 Dumps PDF and CV0-002 Dumps VCE, Lead4Pass CV0-002 exam questions updated and answers corrected!
Get the full CompTIA CV0-002 dumps from https://www.leads4pass.com/cv0-002.html (VCE&PDF)

Latest CV0-002 PDF for free

Share the CompTIA CV0-002 Dumps PDF for free From Lead4pass CV0-002 Dumps part of the distraction collected on Google Drive shared by Lead4pass
https://drive.google.com/file/d/1Ng_rjr5bg2Zdp85rzWqzZAa6b77X6SXR/

The latest updated CompTIA CV0-002 Exam Practice Questions and Answers Online Practice Test is free to share from Lead4Pass (Q1-Q13)

QUESTION 1
A storage appliance has lost all network access. Which of the following network access methods could a storage
engineer use to investigate and correct the issue?
A. HTTP
B. Console port
C. RDP
D. SSH
Correct Answer: D

QUESTION 2
A company is implementing a private cloud infrastructure and is testing its high availability components. In a planned
outage test, all systems will be shut down sequentially. Which of the following would be the LAST area to shut down?
A. Offsite mirror
B. Networking
C. Hypervisors
D. Storage
Correct Answer: C

QUESTION 3
A cloud administrator has finished building a virtual server template in a public cloud environment. The administrator is
now cloning six servers from that template. Each server is configured with one private IP address and one public IP
address. After starting the server instances, the cloud administrator notices that two of the servers do not have a public
IP address. Which of the following is the MOST likely cause?
A. The maximum number of public IP addresses has already been reached.
B. The two servers are not attached to the correct public subnet.
C. There is no Internet gateway configured in the cloud environment.
D. The two servers do not have enough virtual network adapters attached.
Correct Answer: D

QUESTION 4
Which of the following contributes to increased read access performance on a fibre channel SAN?
A. Zoning
B. Clustered storage
C. Caching
D. QoS
Correct Answer: C

QUESTION 5
An organization wants to create a server VM that is segregated from the rest of the servers. Which of the following
should the server administrator configure?
A. Virtual NIC
B. Trunk port
C. Virtual memory
D. VPN connection
Correct Answer: A

QUESTION 6
When a customer requests a VM to perform at higher levels the administrator should (Select two):
A. increase the VMs vRAM.
B. increase RAM on the host.
C. migrate the VM to a faster online host.
D. increase the VMs vCPU count.
E. increase disk space.
Correct Answer: AD

QUESTION 7
A system has the ability to automatically provision additional virtual servers in response to a load increase. This is an
example of which of the following cloud features?
A. Replication
B. Resource Pooling
C. Orchestration
D. Virtual Network
Correct Answer: D

QUESTION 8
A virtual machine snapshot is:
A. a backup copy of the virtual machine.
B. a revertible point in time of the virtual machine.
C. an exact copy of the virtual machine.
D. an image of the virtual machine.
Correct Answer: B

QUESTION 9
After a recent outage going unnoticed, an administrator has been tasked to configure monitoring for the Linux-based
and Windows-based host operating systems in a hybrid cloud. Which of the following services should the administrator
confirm are functional prior to employing centralized monitoring to both types of operating systems? (Select two.)
A. Syslog services
B. Cron services
C. Web services
D. Task Manager services
E. WMI services
Correct Answer: AB

QUESTION 10
A cloud administrator is given a requirement to maintain a copy of all system logs for seven years. All servers are
deployed in a public cloud provider\\’s environment. Which of the following is the MOST cost-efficient solution for
retaining these logs?
A. Create a long-term storage repository at the cloud provider. Have all logs copied to the cloud storage device.
B. Schedule a nightly job on each server to archive all logs. Copy them to a compressed drive on the server.
C. Configure SMTP services on each server and schedule a nightly job to email the logs to the cloud administrator
team\\’s email account.
D. Configure a nightly job on each server to copy all logs to a single server. Schedule a job on the server to archive
those logs into a compressed drive.
Correct Answer: B

QUESTION 11
Which of the following server types would be an ideal candidate for virtualization? (Select two.)
A. Hypervisor
B. Terminal server
C. Mail server
D. Enterprise database server
E. Domain controller
Correct Answer: CD

QUESTION 12
Which of the following would be used to establish a dedicated connection in a hybrid cloud environment?
A. CHAP
B. AES
C. PKI
D. VPN
Correct Answer: D

QUESTION 13
An administrator needs to test that a service is responding to external requests. Which of the following tools can be
used to accomplish this task?
A. ping
B. tracert/traceroute
C. telnet
D. ipconfig/ifconfig
Correct Answer: B


Braindump4it shares the latest updated CompTIA CV0-002 exam exercise questions, CV0-002 dumps pdf for free.
All exam questions and answers come from the Lead4pass exam dumps shared part! Lead4pass updates throughout the year and shares a
portion of your exam questions for free to help you understand the exam content and enhance your exam experience!
Get the full CompTIA CV0-002 exam dumps questions at: https://www.leads4pass.com/cv0-002.html (pdf&vce)

ps.
Get free CompTIA CV0-002 dumps PDF online: https://drive.google.com/file/d/1Ng_rjr5bg2Zdp85rzWqzZAa6b77X6SXR/

[MAR 2021] CompTIA CS0-002 exam dumps and online practice questions are available from Lead4Pass

The latest updated CompTIA CS0-002 exam dumps and free CS0-002 exam practice questions and answers! Latest updates from Lead4Pass CompTIA CS0-002 Dumps PDF and CS0-002 Dumps VCE, Lead4Pass CS0-002 exam questions updated and answers corrected!
Get the full CompTIA CS0-002 dumps from https://www.leads4pass.com/cs0-002.html (VCE&PDF)

Latest CS0-002 PDF for free

Share the CompTIA CS0-002 Dumps PDF for free From Lead4pass CS0-002 Dumps part of the distraction collected on Google Drive shared by Lead4pass
https://drive.google.com/file/d/1XuTVvaCEqjkY-h0L_DQCfSH1B_Y061Sd/

The latest updated CompTIA CS0-002 Exam Practice Questions and Answers Online Practice Test is free to share from Lead4Pass (Q1-Q13)

QUESTION 1
An audit has revealed an organization is utilizing a large number of servers that are running unsupported operating
systems.
As part of the management response phase of the audit, which of the following would BEST demonstrate senior
management is appropriately aware of and addressing the issue?
A. Copies of prior audits that did not identify the servers as an issue
B. Project plans relating to the replacement of the servers that were approved by management
C. Minutes from meetings in which risk assessment activities addressing the servers were discussed
D. ACLs from perimeter firewalls showing blocked access to the servers
E. Copies of change orders relating to the vulnerable servers
Correct Answer: C

QUESTION 2
A security analyst is responding to an incident on a web server on the company network that is making a large number
of outbound requests over DNS Which of the following is the FIRST step the analyst should take to evaluate this potential indicator of compromise\\’?
A. Run an anti-malware scan on the system to detect and eradicate the current threat
B. Start a network capture on the system to look into the DNS requests to validate command and control traffic.
C. Shut down the system to prevent further degradation of the company network
D. Reimage the machine to remove the threat completely and get back to a normal running state.
E. Isolate the system on the network to ensure it cannot access other systems while evaluation is underway.
Correct Answer: A

QUESTION 3
An analyst has been asked to provide feedback regarding the controls required by a revised regulatory framework. At
this time, the analyst only needs to focus on the technical controls.
Which of the following should the analyst provide an assessment of?
A. Tokenization of sensitive data
B. Establishment of data classifications
C. Reporting on data retention and purging activities
D. Formal identification of data ownership
E. Execution of NDAs
Correct Answer: A

QUESTION 4
A security analyst is reviewing the following log entries to identify anomalous activity:[2021.3] lead4pass cs0-002 practice test q4

Which of the following attack types is occurring?
A. Directory traversal
B. SQL injection
C. Buffer overflow
D. Cross-site scripting
Correct Answer: A

QUESTION 5
A security analyst is investigating a compromised Linux server. The analyst issues the ps command and receives the
following output:[2021.3] lead4pass cs0-002 practice test q5

Which of the following commands should the administrator run NEXT to further analyze the compromised system?
A. strace /proc/1301
B. rpm -V openash-server
C. /bin/la -1 /proc/1301/exe
D. kill -9 1301
Correct Answer: A

QUESTION 6
A security analyst is investigating a system compromise. The analyst verifies the system was up to date on OS patches
at the time of the compromise. Which of the following describes the type of vulnerability that was MOST likely
exploited?
A. Insider threat
B. Buffer overflow
C. Advanced persistent threat
D. Zero-day
Correct Answer: D

QUESTION 7
An analyst is investigating an anomalous event reported by the SOC. After reviewing the system logs, the analyst
identifies an unexpected addition of a user with root-level privileges on the endpoint. Which of the following data sources
will BEST help the analyst to determine whether this event constitutes an incident?
A. Patching logs
B. Threat feed
C. Backup logs
D. Change requests
E. Data classification matrix
Correct Answer: E

QUESTION 8
An analyst identifies multiple instances of node-to-node communication between several endpoints within the
10.200.2.0/24 network and a user machine at the IP address 10.200.2.5. This user machine at the IP address
10.200.2.5 is also identified as initiating outbound communication during atypical business hours with several IP
addresses that have recently appeared on threat feeds.
Which of the following can be inferred from this activity?
A. 10.200.2.0/24 is infected with ransomware.
B. 10.200.2.0/24 is not routable address space.
C. 10.200.2.5 is a rogue endpoint.
D. 10.200.2.5 is exfiltrating data.
Correct Answer: D

QUESTION 9
Which of the following BEST describes the process by which code is developed, tested, and deployed in small
batches?
A. Agile
B. Waterfall
C. SDLC
D. Dynamic code analysis
Correct Answer: C
Reference: https://www.cleverism.com/software-development-life-cycle-sdlc-methodologies/

QUESTION 10
A network attack that is exploiting a vulnerability in the SNMP is detected. Which of the following should the
cybersecurity analysts do FIRST?
A. Apply the required patches to remediate the vulnerability.
B. Escalate the incident to senior management for guidance.
C. Disable all privileged user accounts on the network.
D. Temporarily block the attacking IP address.
Correct Answer: A
Reference: https://beyondsecurity.com/scan-pentest-network-vulnerabilities-snmp-protocol-version-detection.html

QUESTION 11
As part of a merger with another organization, a Chief Information Security Officer (CISO) is working with an assessor to
perform a risk assessment focused on data privacy compliance. The CISO is primarily concerned with the potential legal
liability and fines associated with data privacy. Based on the CISO\\’s concerns, the assessor will MOST likely focus on:
A. qualitative probabilities.
B. quantitative probabilities.
C. qualitative magnitude.
D. quantitative magnitude.
Correct Answer: D

QUESTION 12
The security team at a large corporation is helping the payment-processing team to prepare for a regulatory compliance
audit and meet the following objectives:
1.
Reduce the number of potential findings by the auditors.
2.
Limit the scope of the audit to only devices used by the payment-processing team for activities directly impacted by the
regulations.
3.
Prevent the external-facing web infrastructure used by other teams from coming into the scope.
4.
Limit the amount of exposure the company will face if the systems used by the payment-processing team are
compromised.
Which of the following would be the MOST effective way for the security team to meet these objectives?
A. Limit the permissions to prevent other employees from accessing data owned by the business unit.
B. Segment the servers and systems used by the business unit from the rest of the network.
C. Deploy patches to all servers and workstations across the entire organization.
D. Implement full-disk encryption on the laptops used by employees of the payment-processing team.
Correct Answer: B

QUESTION 13
When attempting to do a stealth scan against a system that does not respond to ping, which of the following Nmap
commands BEST accomplishes that goal?
A. Nmap -SA -O -noping
B. Nmap -sT -O -P0
C. Nmap -sS -O -P0
D. Nmap -SQ -O -P0
Correct Answer: C


Fulldumps shares the latest updated CompTIA CS0-002 exam exercise questions, CS0-002 dumps pdf for free.
All exam questions and answers come from the Lead4pass exam dumps shared part! Lead4pass updates throughout the year and shares a portion of your exam questions for free to help you understand the exam content and enhance your exam experience!
Get the full CompTIA CS0-002 exam dumps questions at https://www.leads4pass.com/cs0-002.html (pdf&vce)

ps.
Get free CompTIA CS0-002 dumps PDF online: https://drive.google.com/file/d/1XuTVvaCEqjkY-h0L_DQCfSH1B_Y061Sd/

[MAR 2021] CompTIA CLO-002 exam dumps and online practice questions are available from Lead4Pass

The latest updated CompTIA CLO-002 exam dumps and free CLO-002 exam practice questions and answers! Latest updates from Lead4Pass CompTIA CLO-002 Dumps PDF and CLO-002 Dumps VCE, Lead4Pass CLO-002 exam questions updated and answers corrected!
Get the full CompTIA CLO-002 dumps from https://www.leads4pass.com/clo-002.html (VCE&PDF)

Latest CLO-002 PDF for free

Share the CompTIA CLO-002 Dumps PDF for free From Lead4pass CLO-002 Dumps part of the distraction collected on Google Drive shared by Lead4pass
https://drive.google.com/file/d/17rKRncxDP0FuCHLKkOwHUEREKysq3eHv/

The latest updated CompTIA CLO-002 Exam Practice Questions and Answers Online Practice Test is free to share from Lead4Pass (Q1-Q13)

QUESTION 1
A company is required to move its human resources application to the cloud to reduce capital expenses. The IT team
does a feasibility analysis and learns the application requires legacy infrastructure and cannot be moved to the cloud.
Which of the following is the MOST appropriate cloud migration approach for the company?
A. Lift and shift
B. Hybrid
C. Rip and replace
D. In-place upgrade
Correct Answer: B

QUESTION 2
A cloud systems administrator needs to log in to a remote Linux server that is hosted in a public cloud. Which of the
following protocols will the administrator MOST likely use?
A. HTTPS
B. RDP
C. Secure Shell
D. Virtual network computing
Correct Answer: C

QUESTION 3
A project manager must inform the Chief Information Officer (CIO) of the additional resources necessary to migrate
services to the cloud successfully.
Which of the following cloud assessments would be MOST appropriate to use for the recommendation?
A. Feasibility study
B. Gap analysis
C. Future requirements
D. Baseline report
Correct Answer: B

QUESTION 4
An organization wants to migrate a locally hosted application to a PaaS model. The application currently runs on a
15-year-old operating system and cannot be upgraded.
Which of the following should the organization perform to ensure the application will be supported in the cloud?
A. Risk register
B. Feasibility study
C. Benchmarks
D. Baseline
Correct Answer: B

QUESTION 5
A company has been running tests on a newly developed algorithm to increase the responsiveness of the application.
The company\\’s monthly bills for the testing have been much higher than expected.
Which of the following documents should the company examine FIRST?
A. Memory report
B. Compute report
C. Network report
D. Storage report
Correct Answer: C

QUESTION 6
Which of the following types of risk is MOST likely to be associated with moving all data to one cloud provider?
A. Vendor lock-in
B. Data portability
C. Network connectivity
D. Data sovereignty
Correct Answer: A

QUESTION 7
A small business is engaged with a cloud provider to migrate from on-premises CRM software. The contract includes
fixed costs associated with the product. Which of the following variable costs must be considered?
A. Time to market
B. Operating expenditure fees
C. BYOL costs
D. Human capital
Correct Answer: D

QUESTION 8
A company is moving to the cloud and wants to enhance the provisioning of computing, storage, security, and networking.
Which of the following will be leveraged?
A. Infrastructure as code
B. Infrastructure templates
C. Infrastructure orchestration
D. Infrastructure automation
Correct Answer: D

QUESTION 9
Which of the following services would restrict connectivity to cloud resources?
A. Security lists
B. Firewall
C. VPN
D. Intrusion detection system
Correct Answer: A

QUESTION 10
Which of the following is an example of outsourcing administration in the context of the cloud?
A. Managed services
B. Audit by a third party
C. Community support
D. Premium support
Correct Answer: A

QUESTION 11
A cloud administrator configures a server to insert an entry into a log file whenever an administrator logs in to the server
remotely. Which of the following BEST describes the type of policy is used?
A. Audit
B. Authorization
C. Hardening
D. Access
Correct Answer: A

QUESTION 12
Which of the following can be used by a client\\’s finance department to identify the cost of cloud use in a public cloud
environment shared by different projects and departments?
A. Reserved instances
B. Service level agreement
C. Resource tagging
D. RFI from the CSP
Correct Answer: C

QUESTION 13
A company with critical resources in the cloud needs to ensure data is available in multiple data centers around the
world.
Which of the following BEST meets the company\\’s needs?
A. Auto-scaling
B. Geo-redundancy
C. Disaster recovery
D. High availability
Correct Answer: B


Braindump4it shares the latest updated CompTIA CLO-002 exam exercise questions, CLO-002 dumps pdf for free.
All exam questions and answers come from the Lead4pass exam dumps shared part! Lead4pass updates throughout the year and shares a
portion of your exam questions for free to help you understand the exam content and enhance your exam experience!
Get the full CompTIA CLO-002 exam dumps questions at: https://www.leads4pass.com/clo-002.html (pdf&vce)

ps.
Get free CompTIA CLO-002 dumps PDF online: https://drive.google.com/file/d/17rKRncxDP0FuCHLKkOwHUEREKysq3eHv/

[MAR 2021] CompTIA CAS-003 exam dumps and online practice questions are available from Lead4Pass

The latest updated CompTIA CAS-003 exam dumps and free CAS-003 exam practice questions and answers! Latest updates from Lead4Pass CompTIA CAS-003 Dumps PDF and CAS-003 Dumps VCE, Lead4Pass CAS-003 exam questions updated and answers corrected!
Get the full CompTIA CAS-003 dumps from https://www.leads4pass.com/cas-003.html (VCE&PDF)

Latest CAS-003 PDF for free

Share the CompTIA CAS-003 Dumps PDF for free From Lead4pass CAS-003 Dumps part of the distraction collected on Google Drive shared by Lead4pass
https://drive.google.com/file/d/1JTsX2fmwZCYTE1uEVTEt1vANk-lSbMNT/

The latest updated CompTIA CAS-003 Exam Practice Questions and Answers Online Practice Test is free to share from Lead4Pass (Q1-Q13)

QUESTION 1
A company wants to extend its help desk availability beyond business hours. The Chief Information Officer (CIO)
decides to augment the help desk with a third-party service that will answer calls and provide Tier 1 problem resolution,
such as password resets and remote assistance. The security administrator implements the following firewall change:
The administrator provides the appropriate path and credentials to the third-party company. Which of the following
technologies is MOST likely being used to provide access to the third company?[2021.3] lead4pass cas-003 practice test q1

A. LDAP
B. WAYF
C. OpenID
D. RADIUS
E. SAML
Correct Answer: D

QUESTION 2
A systems administrator establishes a CIFS share on a UNIX device to share data to Windows systems. The security
authentication on the Windows domain is set to the highest level. Windows users are stating that they cannot
authenticate to the UNIX share. Which of the following settings on the UNIX server would correct this problem?
A. Refuse LM and only accept NTLMv2
B. Accept only LM
C. Refuse NTLMv2 and accept LM
D. Accept only NTLM
Correct Answer: A
In a Windows network, NT LAN Manager (NTLM) is a suite of Microsoft security protocols that provides authentication,
integrity, and confidentiality to users. NTLM is the successor to the authentication protocol in Microsoft LAN Manager
(LANMAN or LM), an older Microsoft product, and attempts to provide backward compatibility with LANMAN. NTLM
version 2 (NTLMv2), which was introduced in Windows NT
4.0 SP4 (and natively supported in Windows 2000), enhances NTLM security by hardening the protocol against many
spoofing attacks and adding the ability for a server to authenticate to the client.
This question states that the security authentication on the Windows domain is set to the highest level. This will be
NTLMv2. Therefore, the answer to the question is to allow NTLMv2 which will enable the Windows users to connect to
the UNIX server. To improve security, we should disable the old and insecure LM protocol as it is not used by the
Windows computers.

QUESTION 3
An administrator wants to enable policy-based flexible mandatory access controls on an open-source OS to prevent
abnormal application modifications or executions. Which of the following would BEST accomplish this?
A. Access control lists
B. SELinux
C. IPtables firewall
D. HIPS
Correct Answer: B
The most common open-source operating system is LINUX.
Security-Enhanced Linux (SELinux) was created by the United States National Security Agency (NSA) and is a Linux
kernel security module that provides a mechanism for supporting access control security policies, including United
States Department of Defense style mandatory access controls (MAC).
NSA Security-enhanced Linux is a set of patches to the Linux kernel and some utilities to incorporate a strong, flexible
mandatory access control (MAC) architecture into the major subsystems of the kernel. It provides an enhanced
mechanism to enforce the separation of information based on confidentiality and integrity requirements, which allows
threats of tampering and bypassing of application security mechanisms to be addressed and enables the confinement of
damage that can be caused by malicious or flawed applications.

QUESTION 4
A database administrator is required to adhere to and implement privacy principles when executing daily tasks. A
manager directs the administrator to reduce the number of unique instances of PII stored within an organization\\’s
systems to the greatest extent possible. Which of the following principles is being demonstrated?
A. Administrator accountability
B. PII security
C. Record transparency
D. Data minimization
Correct Answer: D

QUESTION 5
A developer is determining the best way to improve security within the code being developed. The developer is focusing
on input fields where customers enter their credit card details. Which of the following techniques, if implemented in the
code, would be the MOST effective in protecting the fields from malformed input?
A. Client-side input validation
B. Stored procedure
C. Encrypting credit card details
D. Regular expression matching
Correct Answer: D
Regular expression matching is a technique for reading and validating input, particularly in web software. This question
is asking about securing input fields where customers enter their credit card details. In this case, the expected input into
the credit card number field would be a sequence of numbers of a certain length. We can use regular expression
matching to verify that the input is indeed a sequence of numbers. Anything that is not a sequence of numbers could be
malicious code.

QUESTION 6
An internal application has been developed to increase the efficiency of an operational process of a global
manufacturer. New code was implemented to fix a security bug, but it has caused operations to halt. The executive
team has decided fixing the security bug is less important than continuing operations.
Which of the following would BEST support immediate rollback of the failed fix? (Choose two.)
A. Version control
B. Agile development
C. Waterfall development
D. Change management
E. Continuous integration
Correct Answer: AD

QUESTION 7
An insurance company has two million customers and is researching the top transactions on its customer portal. It
identifies that the top transaction is currently password reset. Due to users not remembering their secret questions, a
large number of calls are consequently routed to the contact center for manual password resets. The business wants to
develop a mobile application to improve customer engagement in the future, continue with a single factor of
authentication, minimize management overhead of the solution, remove passwords, and eliminate the contact center.
Which of the following techniques would BEST meet the requirements? (Choose two.)
A. Magic link sent to an email address
B. Customer ID sent via push notification
C. SMS with OTP sent to a mobile number
D. Third-party social login
E. Certificate sent to be installed on a device
F. Hardware tokens sent to customers
Correct Answer: CE

QUESTION 8
A security analyst is inspecting the pseudocode of the following multithreaded application:
1. perform daily ETL of data
1.1 validate that yesterday\\’s data model file exists
1.2 validate that today\\’s data model file does not exist
1.2 extract yesterday\\’s data model
1.3 transform the format
1.4 load the transformed data into today\\’s data model file
1.5 exit
Which of the following security concerns is evident in the above pseudocode?
A. Time of check/time of use
B. Resource exhaustion
C. Improper storage of sensitive data
D. Privilege escalation
Correct Answer: A

QUESTION 9
A senior network security engineer has been tasked to decrease the attack surface of the corporate network. Which of
the following actions would protect the external network interfaces from external attackers performing network
scanning?
A. Remove contact details from the domain name registrar to prevent social engineering attacks.
B. Test external interfaces to see how they function when they process fragmented IP packets.
C. Enable a honeynet to capture and facilitate future analysis of malicious attack vectors.
D. Filter all internal ICMP message traffic, forcing attackers to use full-blown TCP port scans against external network
interfaces.
Correct Answer: B
Fragmented IP packets are often used to evade firewalls or intrusion detection systems.
Port Scanning is one of the most popular reconnaissance techniques attackers use to discover services they can break
into. All machines connected to a Local Area Network (LAN) or Internet run many services that listen at well-known and
not-so-well-known ports. A port scan helps the attacker find which ports are available (i.e., what service might be listing
to a port).
One problem, from the perspective of the attacker attempting to scan a port, is that services listening on these ports log
scans. They see an incoming connection, but no data, so an error is logged. There exist a number of stealth scan
techniques to avoid this. One method is a fragmented port scan.
Fragmented packet Port Scan
The scanner splits the TCP header into several IP fragments. This bypasses some packet filter firewalls because they
cannot see a complete TCP header that can match their filter rules. Some packet filters and firewalls do queue all IP
fragments, but many networks cannot afford the performance loss caused by the queuing.

QUESTION 10
A pentester must attempt to crack passwords on a windows domain that enforces strong complex passwords. Which of
the following would crack the MOST passwords in the shortest time period?
A. Online password testing
B. Rainbow tables attack
C. Dictionary attack D. Brute force attack
Correct Answer: B
The passwords in a Windows (Active Directory) domain are encrypted.
When a password is “tried” against a system it is “hashed” using encryption so that the actual password is never sent in
clear text across the communications line. This prevents eavesdroppers from intercepting the password. The hash of a
password usually looks like a bunch of garbage and is typically a different length than the original password. Your
password might be “shitzu” but the hash of your password would look something like
“7378347eedbfdd761619451949225ec1”.
To verify a user, a system takes the hash value created by the password hashing function on the client computer and
compares it to the hash value stored in a table on the server. If the hashes match, then the user is authenticated and
granted access.
Password cracking programs work in a similar way to the login process. The cracking program starts by taking plaintext
passwords, running them through a hash algorithm, such as MD5, and then compares the hash output with the hashes
in the stolen password file. If it finds a match then the program has cracked the password.
Rainbow Tables are basically huge sets of precomputed tables filled with hash values that are pre-matched to possible
plaintext passwords. The Rainbow Tables essentially allow hackers to reverse the hashing function to determine what
the plaintext password might be.
The use of Rainbow Tables allow for passwords to be cracked in a very short amount of time compared with brute-force
methods, however, the trade-off is that it takes a lot of storage (sometimes Terabytes) to hold the Rainbow Tables
themselves.

QUESTION 11
The Chief Information Officer (CISO) is concerned that certain systems administrators will privileged access may be
reading other users\\’ emails. A review of a tool\\’s output shows the administrators have used webmail to log into other
users\\’ inboxes.
Which of the following tools would show this type of output?
A. Log analysis tool
B. Password cracker
C. Command-line tool
D. File integrity monitoring tool
Correct Answer: A

QUESTION 12
A software development manager is running a project using agile development methods. The company cybersecurity
engineer has noticed a high number of vulnerabilities have been making it into production code on the project.
Which of the following methods could be used in addition to an integrated development environment to reduce the
severity of the issue?
A. Conduct a penetration test on each function as it is developed
B. Develop a set of basic checks for common coding errors
C. Adopt a waterfall method of software development
D. Implement unit tests that incorporate static code analyzers
Correct Answer: D

QUESTION 13
select id, firstname, lastname from authors
User input= firstname= Hack;man
lastname=Johnson
Which of the following types of attacks is the user attempting?
A. XML injection
B. Command injection
C. Cross-site scripting
D. SQL injection
Correct Answer: D
The code in the question is SQL code. The attack is a SQL injection attack. SQL injection is a code injection technique,
used to attack data-driven applications, in which malicious SQL statements are inserted into an entry field for execution
(e.g. to dump the database contents to the attacker). SQL injection must exploit a security vulnerability in an
application\\’s software, for example, when user input is either incorrectly filtered for string literal escape characters
embedded in SQL statements or user input is not strongly typed and unexpectedly executed. SQL injection is mostly
known as an attack vector for websites but can be used to attack any type of SQL database.


Braindump4it shares the latest updated CompTIA CAS-003 exam exercise questions, CAS-003 dumps pdf for free.
All exam questions and answers come from the Lead4pass exam dumps shared part! Lead4pass updates throughout the year and shares a portion of your exam questions for free to help you understand the exam content and enhance your exam experience!
Get the full CompTIA CAS-003 exam dumps questions at: https://www.leads4pass.com/cas-003.html (pdf&vce)

ps.
Get free CompTIA CAS-003 dumps PDF online: https://drive.google.com/file/d/1D1USsX5ML464scD9Df8P_Hga4jFL94Af/

[MAR 2021] CompTIA 220-1002 exam dumps and online practice questions are available from Lead4Pass

The latest updated CompTIA 220-1002 exam dumps and free 220-1002 exam practice questions and answers! Latest updates from Lead4Pass CompTIA 220-1002 Dumps PDF and 220-1002 Dumps VCE, Lead4Pass 220-1002 exam questions updated and answers corrected!
Get the full CompTIA 220-1002 dumps from https://www.leads4pass.com/220-1002.html (VCE&PDF)

Latest 220-1002 PDF for free

Share the CompTIA 220-1002 Dumps PDF for free From Lead4pass 220-1002 Dumps part of the distraction collected on Google Drive shared by Lead4pass
https://drive.google.com/file/d/1_ZyABVHqCCTNz6MW5ISi8N1Q7AKZAQcX/

The latest updated CompTIA 220-1002 Exam Practice Questions and Answers Online Practice Test is free to share from Lead4Pass (Q1-Q12)

QUESTION 1
Joe. a technician, receives notification that a share for production data files on the network Is encrypted. Joe suspects a
cryptovirus Is active. He checks the rights of the network share to see which departments have access. He then
searches the user directories of those departmental users who are looking for encrypted files. He narrows his search to
a single user\\’s computer. Once the suspected source of the virus is discovered and removed from the network, which
of the following should Joe do NEXT?
A. Educate the end-user on safe browsing and email habits.
B. Scan and remove the malware from the infected system.
C. Create a system restore point and reboot the system.
D. Schedule antivirus scans and performs Windows updates.
Correct Answer: D

QUESTION 2
A technician has just removed malware from a Windows 7 system, but the user reports that every time they type a URL
into Internet Explorer to navigate to a search engine the same standard page is being displayed on the browser. The
page is asking the user to purchase antivirus software.
Please resolve the problem using the available tools shown. When you have completed the simulation, please select the
done button to submit your answer.lead4pass 220-1002 practice test q2

A. Please review for the detailed answer.
Correct Answer: A
Please check the below images for detailed steps to do:

lead4pass 220-1002 practice test q2-1 lead4pass 220-1002 practice test q2-2 lead4pass 220-1002 practice test q2-3

QUESTION 3
Which of the following is used for building entry and computer access?
A. Smart card
B. Personal identity verification card
C. Hardware tokens
D. Key fobs
Correct Answer: D

QUESTION 4
Which of the following technologies is used by malicious employees to obtain user passwords?
A. Main-in-the-middle
B. Phishing
C. Tailgating
D. Shoulder surfing
Correct Answer: D

QUESTION 5
A user has been receiving reply emails from many contacts but the content of the emails is not familiar and the user did
not send the original messages. The user calls the help desk for assistance. Which of the following is the BEST way the
technician can fix this problem?
A. Perform an antivirus scan
B. Perform a refresh/restore
C. Perform an IDS upgrade
D. Perform a reinstall of the email client
Correct Answer: A

QUESTION 6
A user wants to see the workstations present on the LAN in a workgroup environment. Which of the following settings
must be enabled to make this possible?
A. Turn off public folder sharing
B. Turn on network discovery
C. Use 128-bit encryption
D. Turn on file and folder sharing
Correct Answer: B

QUESTION 7
A Linux user reports that an application will not open and gives the error. Only one instance of the application may run
at one time. A root administrator logs on to the device and opens a terminal. Which of the following pairs of tools will be
needed to ensure no other instances of the software are currently running?
A. pad and chmod
B. Sudo and vi
C. ls and chown
D. ps and kill
E. cp and rm
Correct Answer: D

QUESTION 8
A company\\’s security team has noticed a lot of unusual network traffic coming from an internal IP address. The team
wants to obtain the name of the computer and then troubleshoot. Which of the following tools would BEST accomplish
this task?
A. nslookup
B. ipconfig
C. tracert
D. ping
Correct Answer: A
New Question, pending the Answer.

QUESTION 9
A technician is in the process of upgrading Windows 8 to Windows 10. The technician needs to make sure all of the
applications, user profiles, documents, and PST files are preserved. Which of the following methods would the technician MOST likely perform on the computer?
A. Unattended installation
B. Refresh upgrade
C. Clean installation
D. In-place upgrade
Correct Answer: B

QUESTION 10
Which of the following technologies can be used to secure mobile devices and their data? (Select TWO).
A. Protective screen
B. Remote wipe
C. Physical lock
D. Locator
E. Passcode lock
Correct Answer: BE

QUESTION 11
A company has just experienced a data breach that affected all mobile devices.
Which of the following would BEST secure access to user\\’s mobile devices? (Choose two.)
A. Full device encryption
B. Remote backup application
C. SSO authentication
D. Device profiles update
E. OS security updates
F. Biometric authentication
Correct Answer: AF

QUESTION 12
An office building lost power, and the generator started up. Users on several floors have reported their machines will not
start, even though the generator is running. A technician works to divert power from other floors until all users are able
to work. Which of the following is the BEST solution for the technician to recommend?
A. Add more redundancy to the power cabling
B. Purchase more battery backups for individual users
C. Implement desktop virtualization
D. Increase the capacity of the backup generator
Correct Answer: D

QUESTION 13
A technician has been dispatched to resolve a malware problem on a user\\’s workstation. The antivirus program
discovered several hundred potential malware items on the workstation and removed them successfully. The technician
decides to schedule daily scans on the system, enables System Restore, and creates a restore point. Which of the
following should the technician do NEXT?
A. Run the scan again to ensure all malware has been removed
B. Quarantine the infected workstation from the network
C. Install all of the latest Windows Updates to patch the system
D. Educate the user on safe browsing practices
Correct Answer: C


Braindump4it shares the latest updated CompTIA 220-1002 exam exercise questions, 220-1002 dumps pdf for free.
All exam questions and answers come from the Lead4pass exam dumps shared part! Lead4pass updates throughout the year and shares a portion of your exam questions for free to help you understand the exam content and enhance your exam experience!
Get the full CompTIA 220-1002 exam dumps questions at https://www.leads4pass.com/220-1002.html (pdf&vce)

ps.
Get free CompTIA 220-1002 dumps PDF online: https://drive.google.com/file/d/1_ZyABVHqCCTNz6MW5ISi8N1Q7AKZAQcX/

[MAR 2021] CompTIA 220-1001 exam dumps and online practice questions are available from Lead4Pass

The latest updated CompTIA 220-1001 exam dumps and free 220-1001 exam practice questions and answers! Latest updates from Lead4Pass CompTIA 220-1001 Dumps PDF and 220-1001 Dumps VCE, Lead4Pass 220-1001 exam questions updated and answers corrected!
Get the full CompTIA 220-1001 dumps from https://www.leads4pass.com/220-1001.html (VCE&PDF)

Latest 220-1001 PDF for free

Share the CompTIA 220-1001 Dumps PDF for free From Lead4pass 220-1001 Dumps part of the distraction collected on Google Drive shared by Lead4pass
https://drive.google.com/file/d/1CkFGB5G9Fd2FJkZ5SkDPKcTmT0iHluS4/

The latest updated CompTIA 220-1001 Exam Practice Questions and Answers Online Practice Test is free to share from Lead4Pass (Q1-Q12)

QUESTION 1
Which of the following devices is used to implement network security policies for an environment?
A. Firewall
B. managed switch
C. Repeater
D. Gateway
Correct Answer: A

QUESTION 2
Which of the following is a common use tor NAT?
A. Automatically assigning network addresses
B. Hiding the network portion of an IPv4 address
C. Connecting multiple devices through a single public IP address
D. Resolving alphanumeric names to addresses
Correct Answer: A

QUESTION 3
A technician creates a VM in a public cloud to test a new application and then deletes the VM when finished. Which of
Does the following BEST describe this type of cloud environment?
A. Community
B. Elastic
C. Hybrid
D. On-demand
Correct Answer: D

QUESTION 4
A technician is building a CAD workstation for a user who will be saving files remotely.
Which of the following components are MOST important to include when configuring the system? (Choose two.)
A. Gigabit NIC
B. Graphics card
C. Liquid cooling unit
D. HDD size
E. RAM
Correct Answer: BE

QUESTION 5
Which of the following is the main purpose of the +5VSB output of a power supply?
A. It allows peripherals to draw power when the machine is off
B. It provides power to the audio and soundboards of the machine
C. It acts as the main voltage supply to the motherboard and processor
D. It powers all expansion cards and external device hubs
Correct Answer: A

QUESTION 6
A developer downloaded and installed a new VM on a hypervisor to test a piece of software following the
release of an OS patch. After installing the VM. the developer is unable to download updates from the
vendor.
Which of the following should the developer check?
A. The hypervisor\\’s security configurations
B. The organization\\’s security policies
C. The guest OS network settings
D. The resource requirements
Correct Answer: C

QUESTION 7
A user\\’s smartphone has been slow recently. A technician sees the phone was purchased two months ago, and it is
top of the line. About a month ago, a new OS update was installed. To address the issue, the technician runs a
hardware diagnostic on the device and it reports no problems. Which of the following is MOST likely the cause of the
performance issue on the device?
A. Too many applications are running updates
B. The device is currently running in airplane mode
C. The internal memory is failing on the device
D. The OS update is too resource-intensive for the device
Correct Answer: A

QUESTION 8
Joe, a user, reports that his new smart wearable device is not synchronizing to his mobile device. Both devices are
powered on, but the mobile device fails to read the data from the wearable. Which of the following will MOST likely fix
this issue?
A. Pair the devices
B. Set the SSID
C. Update the smart wearable device firmware
D. Enable NFC
Correct Answer: A

QUESTION 9
A technician is troubleshooting a network that is experiencing inconsistent connections through one of the network
drops in the board room. The technician wants to verify the integrity of the network run but needs to
identify which cable comes from the board room. However, none of the network connections in the network room are
labeled.
Which of the following are the BEST tools for the technician to use to identify the correct network run to troubleshoot?
(Choose two.)
A. Cable stripper
B. Cable tester
C. Tone generator
D. WiFi analyzer
E. Multimeter
F. Probe
Correct Answer: BE

QUESTION 10
An end-user wants to have a second monitor installed on a laptop. Which of the following would allow a technician to
configure the laptop to show both screens once the cable is connected?
A. Plug an external monitor into the USB port.
B. Use the Fn and function key combination
C. Adjust the monitor display settings.
D. Enable DisplayPort.
Correct Answer: C

QUESTION 11
A technician wants the number of virtual machines hosting a web application in the public cloud environment to scale
based on real-time traffic on the website.
Which of the following should the technician configure?
A. Resource pooling
B. Rapid elasticity
C. Measured service
D. High availability
Correct Answer: B

QUESTION 12
Ann, a customer, purchased a pedometer and created an account on the manufacturer\\’s website to keep track of her
progress. Which of the following technologies will Ann MOST likely use to connect the pedometer to her desktop lo
transfer her information to the website?
A. Bluetooth
B. Infrared
C. NFC
D. Tethering
Correct Answer: A

QUESTION 13
A laptop is connected to a conference room projector in extended display mode. The desktop icons appear normal on
the laptop but are disproportionate and illegible on the projector screen. Which of the following should the technician
check?
A. Video resolution
B. HDMI connection
C. Keystone
D. Focus
Correct Answer: A


Braindump4it shares the latest updated CompTIA 220-1001 exam exercise questions, 220-1001 dumps pdf for free.
All exam questions and answers come from the Lead4pass exam dumps shared part! Lead4pass updates throughout the year and shares a portion of your exam questions for free to help you understand the exam content and enhance your exam experience!
Get the full CompTIA 220-1001 exam dumps questions at https://www.leads4pass.com/220-1001.html (pdf&vce)

ps.
Get free CompTIA 220-1001 dumps PDF online: https://drive.google.com/file/d/1CkFGB5G9Fd2FJkZ5SkDPKcTmT0iHluS4/

[2021.1] Free Amazon CLF-C01 exam practice test and latest updates CLF-C01 dumps from Lead4pass

Newly shared Amazon CLF-C01 exam learning preparation program! Get the latest CLF-C01 exam exercise questions and exam dumps pdf for free! 100% pass the exam to select
the full Amazon CLF-C01 dumps: https://www.leads4pass.com/aws-certified-cloud-practitioner.html the link to get VCE or PDF. All exam questions are updated!

Lead4pass offers the latest Amazon CLF-C01 PDF Google Drive

[Latest updates] Free Amazon CLF-C01 dumps pdf download from Google Drive: https://drive.google.com/file/d/1Uwa52vs4G5v07e7v-yNZ1L7ycTD_aFDt/

Braindump4it Exam Table of Contents:

latest updated Amazon CLF-C01 exam questions and answers

QUESTION 1
Which of the following is a component of the shared responsibility model managed entirely by AWS?
A. Patching operating system software
B. Encrypting data
C. Enforcing multi-factor authentication
D. Auditing physical data center assets
Correct Answer: D
Of course, Amazon is responsible for auditing physical data center assets and resources since it is the property of
Amazon Inc. Customers have no access to physical sites, hence they are not responsible for maintaining physical data
center assets.

QUESTION 2
An Amazon EC2 instance runs only when needed yet must remain active for the duration of the process. What is the
most appropriate purchasing option?
A. Dedicated Instances
B. Spot Instances
C. On-Demand Instances
D. Reserved Instances
Correct Answer: D
Reference: https://jayendrapatil.com/aws-ec2-instance-purchasing-option/

QUESTION 3
Which of the following acts as a virtual firewall at the Amazon EC2 instance level to control traffic for one or more
instances?
A. Access keys
B. Virtual private gateways
C. Security groups
D. Access Control Lists (ACL)
Correct Answer: C
Reference: https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/ec2-security-groups.html

QUESTION 4
According to the AWS shared responsibility model, who is responsible for configuration management?
A. It is solely the responsibility of the customer.
B. It is solely the responsibility of AWS.
C. It is shared between AWS and the customer.
D. It is not part of the AWS shared responsibility model.
Correct Answer: C
AWS maintains the configuration of its infrastructure devices, but a customer is responsible for configuring their own
guest operating systems, databases, and applications. Reference: https://aws.amazon.com/compliance/sharedresponsibility-model/

QUESTION 5
Under the AWS shared responsibility model, which of the following is a responsibility of AWS?
A. Enabling server-side encryption for objects stored in S3
B. Applying AWS IAM security policies
C. Patching the operating system on an Amazon EC2 instance
D. Applying updates to the hypervisor
Correct Answer: D
Reference: https://aws.amazon.com/compliance/shared-responsibility-model/?ref=wellarchitected

QUESTION 6
Which AWS service should be used to monitor Amazon EC2 instances for CPU and network utilization?
A. Amazon Inspector
B. AWS CloudTtail
C. Amazon CloudWatch
D. AWS Config
Correct Answer: C

QUESTION 7
Which of the following are the benefits of running a database on amazon rds compared to an on-premises database?
A. RDS backup is managed by AWS
B. RDS supports any relational database
C. RDs has no database engineer licensing costs.
D. RDS database computes capacity can be easily scaled.
E. RDS inbound traffic content (for example, security groups) is managed by AWS.
Correct Answer: AC

QUESTION 8
Which of the following are benefits of AWS Global Accelerator? (Choose two.)
A. Reduced cost to run services on AWS
B. Improved availability of applications deployed on AWS
C. Higher durability of data stored on AWS
D. Decreased latency to reach applications deployed on AWS
E. Higher security of data stored on AWS
Correct Answer: BD
Reference: https://aws.amazon.com/global-accelerator/faqs/

QUESTION 9
AWS CloudFormation is designed to help the user:
A. model and provision resources.
B. update application code.
C. set up data lakes.
D. create reports for billing.
Correct Answer: A
AWS CloudFormation provides a common language for you to model and provision AWS and third-party application
resources in your cloud environment. AWS CloudFormation allows you to use programming languages or a simple text
file to model and provision, in an automated and secure manner, all the resources needed for your applications across
all regions and accounts. This gives you a single source of truth for your AWS and third-party resources.
Reference: https://aws.amazon.com/cloudformation/

QUESTION 10
Amazon Relational Database Service (Amazon RDS) offers which of the following benefits over traditional database
management?
A. AWS manages the data stored in Amazon RDS tables.
B. AWS manages the maintenance of the operating system.
C. AWS automatically scales up instance types on demand.
D. AWS manages the database type.
Correct Answer: C

QUESTION 11
Which AWS service can be used to turn text into life-like speech?
A. Amazon Polly
B. Amazon Transcribe
C. Amazon Rekognition
D. Amazon Lex
Correct Answer: A
Reference: https://aws.amazon.com/polly/#:~:text=Amazon%20Polly%20is%20a%20service,synthesize%20natural%20
sounding%20human%20speech.

QUESTION 12
Which AWS service can be used to manually launch instances based on resource requirements?
A. Amazon EBS
B. Amazon S3
C. Amazon EC2
D. Amazon ECS
Correct Answer: C

QUESTION 13
What does the AWS Simple Monthly Calculator do?
A. Compares on-premises costs to colocation environments
B. Estimates monthly billing based on projected usage
C. Estimates power consumption at existing data centers
D. Estimates CPU utilization
Correct Answer: B
Reference: https://aws.amazon.com/blogs/aws/estimate-your-c/

Lead4Pass Amazon Discount code 2021

Lead4pass shares the latest Amazon exam Discount code “Amazon“. Enter the Discount code to get a 15% Discount!

About lead4pass

Lead4Pass has 8 years of exam experience! A number of professional Amazon exam experts! Update exam questions throughout the year! The most complete exam questions and answers! The safest buying experience! The greatest free sharing of exam practice questions and answers!
Our goal is to help more people pass the Amazon exam! Exams are a part of life, but they are important!
In the study, you need to sum up the study! Trust Lead4Pass to help you pass the exam 100%!
about lead4pass

Summarize:

Braindump4it free to share Amazon CLF-C01 exam exercise questions, CLF-C01 pdf, CLF-C01 exam video! Lead4pass updated exam questions and answers throughout the year!
Make sure you pass the exam successfully. Select lead4Pass CLF-C01 to pass Amazon CLF-C01 exam “AWS Certified Cloud Practitioner (CLF-C01) certification dumps“.

ps.

Latest update Lead4pass CLF-C01 exam dumps: https://www.leads4pass.com/aws-certified-cloud-practitioner.html (742 Q&As)

[Latest updates] Free Amazon CLF-C01 Dumps pdf download from Google Drive: https://drive.google.com/file/d/1Uwa52vs4G5v07e7v-yNZ1L7ycTD_aFDt/

[2021.1] Free Amazon ANS-C00 exam practice test and latest updates ANS-C00 dumps from Lead4pass

Newly shared Amazon ANS-C00 exam learning preparation program! Get the latest ANS-C00 exam exercise questions and exam dumps pdf for free! 100% pass the exam to select
the full Amazon ANS-C00 dumps: https://www.leads4pass.com/aws-certified-advanced-networking-specialty.html the link to get VCE or PDF. All exam questions are updated!

Lead4pass offers the latest Amazon ANS-C00 PDF Google Drive

[Latest updates] Free Amazon ANS-C00 dumps pdf download from Google Drive: https://drive.google.com/file/d/1kTs1bNqgoh1cFvHpTQiYZ7RO2IAV1qyD/

Braindump4it Exam Table of Contents:

latest updated Amazon ANS-C00 exam questions and answers

QUESTION 1
The IPsec protocol suite is made up of various components covering aspects such as confidentiality, encryption, and
integrity.
Select the correct statement below regarding the correct configuration options to ensure IPsec confidentiality:
A. The following protocols may be used to configure IPsec confidentiality, DES, 3DES, MD5
B. The following protocols may be used to configure IPsec confidentiality, DES, 3DES, AES
C. The following protocols may be used to configure IPsec confidentiality, PSK, RSA
D. The following protocols may be used to configure IPsec confidentiality, PSK, MD5
E. The following protocols may be used to configure IPsec confidentiality, PSK, RSA
Correct Answer: B
Answer A is incorrect – as MD5 is a hashing protocol (data integrity) Answer C is incorrect – as PSK is short for PreShared Keys (key exchange) – and again MD5 is a hashing protocol (data integrity) Answer D is incorrect – as both MD5
and SHA are hashing protocols (data integrity) Answer E is incorrect – as both PSK and RSA are used for key
exchanges This leaves Answer B is the only correct IPsec configuration covering confidentiality. DES, 3DES, and AES
are all encryption protocols.
Reference: https://en.wikipedia.org/wiki/IPsec

QUESTION 2
You have configured a dynamic VPN between your datacenter and your VPC. Your router says the tunnel is up and
BGP is active, but for some reason, you are not seeing your routes propagate. What is most likely the issue?
A. You need to configure the firewall for BGP.
B. Your router does not support BFD.
C. You need to obtain a new BGP MD5 key.
D. You forgot to set route propagation to “yes” in the routeing table.
Correct Answer: D
You forgot to set route propagation to “yes” in the routeing table. If the routeing table says BGP is active and the tunnel is up,
then you do not have a firewall issue. BFD has nothing to do with route propagation. You do not need a BGP MD5 key
for VPN.

QUESTION 3
Which of the following physical layer standards is required for connection to AWS Direct Connect over a standard 1
gigabit or 10 gigabit Ethernet fiber-optic cable?
A. Single-mode fiber, 1000BASE-LX for 1 gigabit Ethernet, or 10GBASE-ER for 10 gigabit Ethernet
B. Multimode fiber, 1000BASE-LX for 1 gigabit Ethernet, or 10GBASE-ER for 10 gigabit Ethernet
C. Single-mode fiber, 1000BASE-LX for 1 gigabit Ethernet, or 10GBASE-LR for 10 gigabit Ethernet
D. Multimode fiber, 1000BASE-SX for 1 gigabit Ethernet, or 10GBASE-SR for 10 gigabit Ethernet
Correct Answer: C
Connections to AWS Direct Connect require single-mode fiber, 1000BASE-LX (1310nm) for 1 gigabit Ethernet, or
10GBASE-LR (1310nm) for 10 gigabit Ethernet. Reference:
http://docs.aws.amazon.com/directconnect/latest/UserGuide/Welcome.html

QUESTION 4
What are two reasons to have multiple IP addresses or interfaces on one server? (Choose two.)
A. You can host multiple SSLs
B. Create management networks
C. Direct Connect connections
D. Teaming multiple NICs for more throughput
Correct Answer: AB
You cannot bind multiple interfaces for faster speeds on AWS

QUESTION 5
Your company runs an application for the US market in the us-east-1 AWS region. This application uses proprietary
TCP and UDP protocols on Amazon Elastic Compute Cloud (EC2) instances. End users run a real-time, front-end
application on their local PCs. This front-end application knows the DNS hostname of the service.
You must prepare the system for global expansion. The end users must access the application with the lowest latency.
How should you use AWS services to meet these requirements?
A. Register the IP addresses of the service hosts as “A” records with latency-based routing policy in Amazon Route 53,
and set a Route 53 health check for these hosts.
B. Set the Elastic Load Balancing (ELB) load balancer in front of the hosts of the service, and register the ELB name of
the main service host as an ALIAS record with a latency-based routing policy in Route 53.
C. Set Amazon CloudFront in front of the host of the service, and register the CloudFront name of the main service as
an ALIAS record in Route 53.
D. Set the Amazon API gateway in front of the service, and register the API gateway name of the main service as an
ALIAS record in Route 53.
Correct Answer: B

QUESTION 6
What two items are required for all AWS VPNs? (Choose two.)
A. Virtual Private Gateway
B. ASN
C. A hardware router
D. Customer Gateway
Correct Answer: AD
An ASN is only required for dynamic VPNs and hardware routers are not required.

QUESTION 7
A team implements a highly available solution using Amazon AppStream 2.0. The AppStream 2.0 fleet needs to
communicate with resources both in an existing VPC and on-premises. The VPC is connected to the on-premises
environment using an AWS Direct Connect private virtual interface.
What implementation enables on-premises users to connect to AppStream and existing VPC resources?
A. Deploy two subnets into the existing VPC. Add a public virtual interface to the Direct Connect connection for users to
access the AppStream endpoint
B. Deploy two subnets into the existing VPC. Add a private virtual interface on the Direct Connect connection for users
to access the AppStream endpoint.
C. Deploy a new VPC with two subnets. Create a VPC peering connection between the two VPCs for users to access
the AppStream endpoint.
D. Deploy one subnet into the existing VPC. Add a private virtual interface on the Direct Connect connection for users to
access the AppStream endpoint.
Correct Answer: A

QUESTION 8
An organization wants to process sensitive information using the Amazon EMR service. The information is stored in onpremises databases. The output of processing will be encrypted using AWS KMS before it is uploaded to a customer-owned Amazon S3 bucket. The current configuration includes a VPS with public and private subnets, with VPN
connectivity to the on-premises network. The security organization does not allow Amazon EC2 instances to run in the
public subnet.
What is the MOST simple and secure architecture that will achieve the organization\\’s goal?
A. Use the existing VPC and configure Amazon EMR in a private subnet with an Amazon S3 endpoint.
B. Use the existing VPS and a NAT gateway and configure Amazon EMR in a private subnet with an Amazon S3
endpoint.
C. Create a new VPS without an IGW and configure the VPN and Amazon EMR in a private subnet with an Amazon S3
endpoint.
D. Create a new VPS without an IGW and configure the VPN and Amazon EMR in a private subnet with an Amazon S3
endpoint and a NAT gateway.
Correct Answer: B

QUESTION 9
An organization has three AWS accounts with each containing VPCs in Virginia, Canada, and the Sydney regions. The
organization wants to determine whether all available Elastic IP addresses (EIPs) in these accounts are attached to
Amazon EC2 instances or in use elastic network interfaces (ENIs) in all of the specified regions for compliance and costoptimization purposes.
Which of the following meets the requirements with the LEAST management overhead?
A. Use an Amazon CloudWatch Events rule to schedule an AWS Lambda function in each account in all three regions
to find the unattached and unused EIPs.
B. Use a CloudWatch event bus to schedule Lambda functions in each account in all three regions to find the
unattached and unused EIPs.
C. Add an AWS managed, EIP-attached AWS Config rule in each region in all three accounts to find unattached and
unused EIPs.
D. Use AWS CloudFormation StackSets to deploy an AWS Config EIP-attached rule in all accounts and regions to find
the unattached and unused EIPs.
Correct Answer: C

QUESTION 10
Your organization has a newly installed 1-Gbps AWS Direct Connect connection. You order the cross-connect from the
Direct Connect location provider to the port on your router in the same facility. To enable the use of your first virtual
interface, your router must be configured appropriately.
What are the minimum requirements for your router?
A. 1-Gbps Multi-Mode Fiber Interface, 802.1Q VLAN, Peer IP Address, BGP Session with MD5.
B. 1-Gbps Single-Mode Fiber Interface, 802.1Q VLAN, Peer IP Address, BGP Session with MD5.
C. IPsec Parameters, Pre-Shared key, Peer IP Address, BGP Session with MD5
D. BGP Session with MD5, 802.1Q VLAN, Route-Map, Prefix List, IPsec encrypted GRE Tunnel
Correct Answer: B

QUESTION 11
To allow all traffic to access an instance in “Subnet 1” that uses “Security Group 1”, what two options need to be
configured? (Choose two.)
A. NACL rule allowing 0.0.0.0/0 to access “Subnet 1”
B. Security Group rule in “Security Group 1” that allows 0.0.0.0/0 inbound
C. Security Group rule in “Security Group 1” that allows outbound traffic to 0.0.0.0/0
D. NACL rule allowing 0.0.0.0/0 to access “Security Group 1”
Correct Answer: AB
You must allow traffic through the NaCl and through the Security Group to access the instance. If there is not an
Outbound allows setup in the NaCl, you may need to set that, but an outbound rule for Security Group 1 is not
necessary as security groups are stateful.

QUESTION 12
Your company just deployed a WAF to protect its resources. You need to create a baseline before you start blocking
traffic. How will you achieve this?
A. Set the WAF to Monitor mode.
B. Set the WAF to its defaults and let it do its job.
C. Setup a Lambda function to monitor Flow Logs and analyze the traffic using Elasticsearch.
D. A WAF is default deny and does not allow this. You need to use an IDS instead.
Correct Answer: A
Monitor mode is the only good choice.

QUESTION 13
What are two routing methods used by Route 53? (Choose two.)
A. RIP
B. Failover
C. Latency
D. AS_PATH
Correct Answer: BC
RIP is used for network routing and AS_PATH is used for BGP path manipulation.

Lead4Pass Amazon Discount code 2021

Lead4pass shares the latest Amazon exam Discount code “Amazon“. Enter the Discount code to get a 15% Discount!

About lead4pass

Lead4Pass has 8 years of exam experience! A number of professional Amazon exam experts! Update exam questions throughout the year! The most complete exam questions and answers! The safest buying experience! The greatest free sharing of exam practice questions and answers!
Our goal is to help more people pass the Amazon exam! Exams are a part of life, but they are important!
In the study, you need to sum up the study! Trust Lead4Pass to help you pass the exam 100%!
about lead4pass

Summarize:

Braindump4it free to share Amazon ANS-C00 exam exercise questions, ANS-C00 pdf, ANS-C00 exam video! Lead4pass updated exam questions and answers throughout the year!
Make sure you pass the exam successfully. Select lead4Pass ANS-C00 to pass Amazon ANS-C00 exam “AWS Certified Advanced Networking – Specialty (ANS-C00) certification dumps“.

ps.

Latest update Lead4pass ANS-C00 exam dumps: https://www.leads4pass.com/aws-certified-advanced-networking-specialty.html (348 Q&As)

[Latest updates] Free Amazon ANS-C00 Dumps pdf download from Google Drive: https://drive.google.com/file/d/1kTs1bNqgoh1cFvHpTQiYZ7RO2IAV1qyD/